skip to main content
research-article

Heterogeneous Integration Supply Chain Integrity Through Blockchain and CHSM

Published: 15 November 2023 Publication History

Abstract

Over the past few decades, electronics have become commonplace in government, commercial, and social domains. These devices have developed rapidly, as seen in the prevalent use of system-on-chips rather than separate integrated circuits on a single circuit board. As the semiconductor community begins conversations over the end of Moore’s law, an approach to further increase both functionality per area and yield using segregated functionality dies on a common interposer die, labeled a System in Package (SiP), is gaining attention. Thus, the chiplet and SiP space has grown to meet this demand, creating a new packaging paradigm, advanced packaging, and a new supply chain. This new distributed supply chain with multiple chiplet developers and foundries has augmented counterfeit vulnerabilities. Chiplets are currently available on an open market, and their origin and authenticity consequently are difficult to ascertain. With this lack of control over the stages of the supply chain, counterfeit threats manifest at the chiplet, interposer, and SiP levels. In this article, we identify counterfeit threats in the SiP domain, and we propose a mitigating framework utilizing blockchain for the effective traceability of SiPs to establish provenance. Our framework utilizes the Chiplet Hardware Security Module to authenticate a SiP throughout its life. To accomplish this, we leverage SiP information including electronic chip identification of chiplets, combating die and IC recycling sensor information, documentation, test patterns and/or electrical measurements, grade, and part number of the SiP. We detail the structure of the blockchain and establish protocols for both enrolling trusted information into the blockchain network and authenticating the SiP. Our framework mitigates SiP counterfeit threats including recycled, remarked, cloned, overproduced interposer, forged documentation, and substituted chiplet while detecting of out-of-spec and defective SiPs.

References

[1]
IEEE Electronics Packaging Society. 2021. Heterogeneous Integration Roadmap 2021 Edition. Retrieved October 13, 2023 from https://eps.ieee.org/technology/heterogeneous-integration-roadmap/2021-edition.html
[2]
Hyperledger Foundation. 2022. HyperLedger Fabric. Retrieved October 13, 2023 from https://www.hyperledger.org/use/fabric
[3]
Hyperledger. 2022. HyperLedger Fabric Documentation–Key Concepts–The Ordering Service. Retrieved October 13, 2023 from https://hyperledger-fabric.readthedocs.io/en/release-2.5/orderer/ordering_service.html
[4]
Aysha Albarqi, Ethar Alzaid, Fatimah Alghamdi, Somaya Asiri, and Jayaprakash Kar. 2015. Public key infrastructure: A survey. Journal of Information Security 6, 1 (2015), 31–37.
[5]
Andreas M. Antonopoulos. 2014. Mastering Bitcoin: Unlocking Digital Crypto-Currencies. O’Reilly Media Inc.
[6]
Alaa Awad Abdellatif, Lutfi Samara, Amr Mohamed, Aiman Erbad, Carla Fabiana Chiasserini, Mohsen Guizani, Mark Dennis O’Connor, and James Laughton. 2021. MEdge-chain: Leveraging edge computing and blockchain for efficient medical data exchange. IEEE Internet of Things Journal 8, 21 (2021), 15762–15775.
[7]
Badr Bellaj, Aafaf Ouaddah, Emmanuel Bertin, Noel Crespi, and Abdellatif Mezrioui. 2022. SOK: A comprehensive survey on distributed ledger technologies. In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC’22). 1–16.
[8]
Swarup Bhunia and Mark Tehranipoor. 2018. Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann, San Francisco, CA.
[9]
Vitalik Buterin. 2014. Ethereum Whitepaper. Retrieved October 13, 2023 from https://ethereum.org/en/whitepaper/
[10]
Chandan Kumar Chaudhary, Urbi Chatterjee, and Debdeep Mukhopadhayay. 2021. Auto-PUFChain: An automated interaction tool for PUFs and blockchain in electronic supply chain. In Proceedings of the 2021 Asian Hardware Oriented Security and Trust Symposium (AsianHOST’21). 1–4.
[11]
Po-Yuan Chen, Cheng-Wen Wu, and Ding-Ming Kwai. 2009. On-chip TSV testing for 3D IC before bonding using sense amplification. In Proceedings of the 2009 Asian Test Symposium. 450–455.
[12]
Chun-Chuan Chi, Cheng-Wen Wu, Min-Jer Wang, and Hung-Chih Lin. 2013. 3D-IC interconnect test, diagnosis, and repair. In Proceedings of the 2013 IEEE 31st VLSI Test Symposium (VTS’13). 1–6.
[13]
Minki Cho, Chang Liu, Dae Hyun Kim, Sung Kyu Lim, and Saibal Mukhopadhyay. 2011. Pre-bond and post-bond test and signal recovery structure to characterize and repair TSV defect induced signal degradation in 3-D system. IEEE Transactions on Components, Packaging and Manufacturing Technology 1, 11 (2011), 1718–1727.
[14]
Pinchen Cui, Julie Dixon, Ujjwal Guin, and Daniel Dimase. 2019. A blockchain-based framework for supply chain provenance. IEEE Access 7 (2019), 157113–157125.
[15]
DCAdmin. 2018. International Technology Roadmap for Semiconductors 2.0: 2015 Edition, Heterogeneous Integration. Retrieved October 13, 2023 from https://www.semiconductors.org/wp-content/uploads/2018/06/2_2015-ITRS-2.0-Herogeneous-Integration.pdf
[16]
Ujjwal Guin, Ke Huang, Daniel DiMase, John M. Carulli, Mohammad Tehranipoor, and Yiorgos Makris. 2014. Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain. Proceedings of the IEEE 102, 8 (2014), 1207–1228.
[17]
Ujjwal Guin, Xuehui Zhang, Domenic Forte, and Mohammad Tehranipoor. 2014. Low-cost on-chip structures for combating die and IC recycling. In Proceedings of the 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC’14). IEEE, Los Alamitos, CA, 1–6.
[18]
C. A. R. Hoare. 1961. Algorithm 64: Quicksort. Communications of the ACM 4, 7 (July 1961), 321.
[19]
Md. Nazmul Islam and Sandip Kundu. 2019. Enabling IC traceability via blockchain pegged to embedded PUF. ACM Transactions on Design Automation of Electronic Systems 24, 3 (April 2019), Article 36, 23 pages.
[20]
Md. Nazmul Islam, Vinay C. Patii, and Sandip Kundu. 2018. On IC traceability via blockchain. In Proceedings of the 2018 International Symposium on VLSI Design, Automation, and Test (VLSI-DAT’18). 1–4.
[21]
Robert Karam, Tamzidul Hoque, Sandip Ray, Mark Tehranipoor, and Swarup Bhunia. 2016. Robust bitstream protection in FPGA-based systems through low-overhead obfuscation. In Proceedings of the 2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig’16). 1–8.
[22]
Hyunwoo Lee, Doowon Kim, and Yonghwi Kwon. 2021. TLS 1.3 in Practice: How TLS 1.3 contributes to the internet. In Proceedings of the Web Conference 2021 (WWW’21). ACM, New York, NY, 70–79.
[23]
Yu-Hsiang Lin, Shi-Yu Huang, Kun-Han Tsai, and Wu-Tung Cheng. 2012. Programmable leakage test and binning for TSVs. In Proceedings of the 2012 IEEE 21st Asian Test Symposium. 43–48.
[24]
Jeonghyeon Ma, Yongrae Jo, and Chanik Park. 2020. PeerBFT: Making hyperledger fabric’s ordering service withstand Byzantine faults. IEEE Access 8 (2020), 217255–217267.
[25]
T. M. Mak. 2014. TSV leakage in Si-interposer & 3D silicon. In Proceedings of the 3D Test Workshop.
[26]
Hadi Mardani Kamali, Kimia Zamiri Azar, Kris Gaj, Houman Homayoun, and Avesta Sasan. 2018. LUT-lock: A novel LUT-based logic obfuscation for FPGA-bitstream and ASIC-hardware protection. In Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI’18). 405–410.
[27]
Bhabendu Kumar Mohanta, Soumyashree S. Panda, and Debasish Jena. 2018. An overview of smart contract and use cases in blockchain technology. In Proceedings of the 2018 9th International Conference on Computing, Communication, and Networking Technologies (ICCCNT’18). 1–4.
[28]
G. E. Moore. 1998. Cramming more components onto integrated circuits. Proceedings of the IEEE 86, 1 (1998), 82–85.
[29]
Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved October 13, 2023 from https://bitcoin.org/bitcoin.pdf
[30]
Duc-Hiep Nguyen, Nguyen Huynh Tuong, and Hoang-Anh Pham. 2020. Blockchain-based farming activities tracker for enhancing trust in the community supported agriculture model. In Proceedings of the 2020 International Conference on Information and Communication Technology Convergence (ICTC’20). 737–740.
[31]
Brandon Noia and Krishnendu Chakrabarty. 2011. Pre-bond probing of TSVs in 3D stacked ICs. In Proceedings of the 2011 IEEE International Test Conference. 1–10.
[32]
U.S. Government Printing Office. 2011. The Committee’s Investigation into Counterfeit Electronic Parts in the Department of Defense Supply Chain. Retrieved October 13, 2023 from https://www.govinfo.gov/content/pkg/CHRG-112shrg72702/html/CHRG-112shrg72702.htm
[33]
Diego Ongaro and John Ousterhout. 2014. In search of an understandable consensus algorithm. In Proceedings of the 2014 USENIX Annual Technical Conference (USENIX ATC’14). 305–320.
[34]
S. S. Rekha, K. Suraj, and K. Sudeendra Kumar. 2021. A holistic blockchain based IC traceability technique. In Proceedings of the 2021 IEEE International Symposium on Smart Electronic Systems (iSES’21). 307–310.
[35]
Md. Sami Ul Islam Sami, Hadi Mardani Kamali, Farimah Farahmandi, Fahim Rahman, and Mark Tehranipoor. 2023. Enabling security of heterogeneous integration: From supply chain to in-field operations. IEEE Design & Test 40, 5 (2023), 86–95.
[36]
Md. Sami Ul Islam Sami, Fahim Rahman, Adam Cron, Dale Donchin, Mike Borza, Farimah Farahmandi, and Mark Tehranipoor. 2021. POCA: First power-on chip authentication in untrusted foundry and assembly. In Proceedings of the 2021 IEEE International Symposium on Hardware Oriented Security and Trust (HOST’21). IEEE, Los Alamitos, CA, 124–135.
[37]
Md. Sami Ul Islam Sami, Fahim Rahman, Farimah Farahmandi, Adam Cron, Mike Borza, and Mark Tehranipoor. 2021. End-to-end secure SoC lifecycle management. In Proceedings of the 2021 58th ACM/IEEE Design Automation Conference (DAC’21). IEEE, Los Alamitos, CA, 1295–1298.
[38]
Debendra Das Sharma. 2022. Universal Chiplet Interconnect Express (UCIe)®: Building an Open Chiplet Ecosystem. Retrieved October 13, 2023 from https://www.uciexpress.org/_files/ugd/0c1418_c5970a68ab214ffc97fab16d11581449.pdf
[39]
Kapil Sharma and Deepakshi Jain. 2019. Consensus algorithms in blockchain technology: A survey. In Proceedings of the 2019 10th International Conference on Computing, Communication, and Networking Technologies (ICCCNT’19). 1–7.
[40]
Farhana Sheikh, Ramune Nagisetty, Tanay Karnik, and David Kehlet. 2021. 2.5D and 3D heterogeneous integration: Emerging applications. IEEE Solid-State Circuits Magazine 13, 4 (2021), 77–87.
[41]
Nick Szabo. 1997. Formalizing and securing relationships on public networks. First Monday 2, 9 (Sept. 1997).
[42]
Nidish Vashistha, Muhammad Monir Hossain, Md. Rakib Shahriar, Farimah Farahmandi, Fahim Rahman, and Mark M. Tehranipoor. 2022. eChain: A blockchain-enabled ecosystem for electronic device authenticity verification. IEEE Transactions on Consumer Electronics 68, 1 (2022), 23–37.
[43]
Nidish Vashistha, Md. Latifur Rahman, Md. Saad Ul Haque, Azim Uddin, Md. Sami Ul Islam Sami, Amit Mazumder Shuo, Paul Calzada, Farimah Farahmandi, Navid Asadizanjani, Fahim Rahman, and Mark Tehranipoor. 2022. ToSHI—Towards Secure Heterogeneous Integration: Security Risks, Threat Assessment, and Assurance. Paper 2022/984. Cryptology ePrint Archive. https://eprint.iacr.org/2022/984
[44]
Jason Vosatka, Andrew Stern, M. M. Hossain, Fahim Rahman, Jeffery Allen, Monica Allen, Farimah Farahmandi, and Mark Tehranipoor. 2020. Tracking cloned electronic components using a consortium-based blockchain infrastructure. In Proceedings of the 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE’20). 1–6.
[45]
Jason Vosatka, Andrew Stern, M. M. Hossain, Fahim Rahman, Jeffery Allen, Monica Allen, Farimah Farahmandi, and Mark Tehranipoor. 2020. Confidence modeling and tracking of recycled integrated circuits, enabled by blockchain. In Proceedings of the 2020 IEEE Research and Applications of Photonics in Defense Conference (RAPID’20). 1–3.
[46]
Ziyuan Wang, Lin Yang, Qin Wang, Donghai Liu, Zhiyu Xu, and Shigang Liu. 2019. ArtChain: Blockchain-enabled platform for art marketplace. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain’19). 447–454.
[47]
Xiaolin Xu, Fahim Rahman, Bicky Shakya, Apostol Vassilev, Domenic Forte, and Mark Tehranipoor. 2019. Electronics supply chain integrity enabled by blockchain. ACM Transactions on Design Automation of Electronic Systems 24, 3 (2019), Article 31, 25 pages.
[48]
Maoxiang Yi, Jingchang Bian, Tianming Ni, Cuiyun Jiang, Hao Chang, and Huaguo Liang. 2019. A pulse shrinking-based test solution for prebond through silicon via in 3-D ICs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 38, 4 (2019), 755–766.
[49]
Shijie Zhang and Jong-Hyouk Lee. 2020. Analysis of the main consensus protocols of blockchain. ICT Express 6, 2 (2020), 93–97.
[50]
Tao Zhang, Fahim Rahman, Mark Tehranipoor, and Farimah Farahmandi. 2023. FPGA-chain: Enabling holistic protection of FPGA supply chain with blockchain technology. IEEE Design & Test 40, 2 (2023), 127–136.
[51]
Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. 2017. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress’17). 557–564.

Cited By

View all
  • (2024)SECT-HI: Enabling Secure Testing for Heterogeneous Integration to Prevent SiP Counterfeits2024 IEEE International Test Conference (ITC)10.1109/ITC51657.2024.00051(303-312)Online publication date: 3-Nov-2024
  • (2024)HI-SST: Safeguarding SiP Authenticity Through Secure Split-Test in Heterogeneous Integration2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI61997.2024.00075(379-384)Online publication date: 1-Jul-2024
  • (2024)Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous IntegrationIEEE Access10.1109/ACCESS.2024.337587412(48081-48107)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Design Automation of Electronic Systems
ACM Transactions on Design Automation of Electronic Systems  Volume 29, Issue 1
January 2024
521 pages
EISSN:1557-7309
DOI:10.1145/3613510
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 15 November 2023
Online AM: 06 October 2023
Accepted: 15 September 2023
Revised: 01 September 2023
Received: 14 February 2023
Published in TODAES Volume 29, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Secure heterogeneous integration
  2. blockchain
  3. electronics supply chain
  4. system in package security
  5. chiplet HSM

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)305
  • Downloads (Last 6 weeks)23
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)SECT-HI: Enabling Secure Testing for Heterogeneous Integration to Prevent SiP Counterfeits2024 IEEE International Test Conference (ITC)10.1109/ITC51657.2024.00051(303-312)Online publication date: 3-Nov-2024
  • (2024)HI-SST: Safeguarding SiP Authenticity Through Secure Split-Test in Heterogeneous Integration2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI61997.2024.00075(379-384)Online publication date: 1-Jul-2024
  • (2024)Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous IntegrationIEEE Access10.1109/ACCESS.2024.337587412(48081-48107)Online publication date: 2024
  • (2024)Rethinking Hardware WatermarkHardware Security10.1007/978-3-031-58687-3_3(143-182)Online publication date: 3-Apr-2024
  • (2024)Materials for Hardware SecurityHardware Security10.1007/978-3-031-58687-3_11(491-521)Online publication date: 3-Apr-2024
  • (2024)Secure Heterogeneous IntegrationHardware Security10.1007/978-3-031-58687-3_10(447-490)Online publication date: 3-Apr-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media